[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#485944: marked as done (net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks)



Your message dated Thu, 12 Jun 2008 16:23:52 +0200
with message-id <20080612142352.GA5342@wavehammer.waldi.eu.org>
and subject line Re: Bug#485944: linux-2.6: CVE-2008-1673 problem when validating length values during decoding of ASN.1 BER data
has caused the Debian Bug report #485944,
regarding net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
485944: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485944
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-2.6
Version: 2.6.22-6.lenny1
Severity: grave
Tags: security patch

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for linux-2.6.

CVE-2008-1673[0]:
| The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6
| and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic
| modules; and (b) the gxsnmp package; does not properly validate length
| values during decoding of ASN.1 BER data, which allows remote
| attackers to cause a denial of service (crash) or execute arbitrary
| code via (1) a length greater than the working buffer, which can lead
| to an unspecified overflow; (2) an oid length of zero, which can lead
| to an off-by-one error; or (3) an indefinite length for a primitive
| encoding.

Patches are linked from the mitre site but I guess you will 
update to 2.6.25.5 anyway.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673
    http://security-tracker.debian.net/tracker/CVE-2008-1673

-- 
Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpjPwcwv3EsZ.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Version: 2.6.25-5

On Thu, Jun 12, 2008 at 03:20:06PM +0200, Nico Golde wrote:
> CVE-2008-1673[0]:

Fixed.

Bastian

-- 
In the strict scientific sense we all feed on death -- even vegetarians.
		-- Spock, "Wolf in the Fold", stardate 3615.4


--- End Message ---

Reply to: